Secure voice

Results: 166



#Item
41Internet / Password / HTTP cookie / Text messaging / Message transfer agent / Voice-mail / Gmail interface / Email / Computer-mediated communication / Computing

Secure e-mail - information to contacts The Swedish Courts regularly use e-mail as a compliment to traditional mail correspondence. In compliance with the Swedish Personal Data Act all electronic court communicati

Add to Reading List

Source URL: www.forvaltningsrattenistockholm.domstol.se

Language: English - Date: 2014-02-25 08:16:28
42Public-key cryptography / Electronic commerce / Key / Secure voice / Crypt / RSA / Cryptography / Secure communication / Key management

1 2 Contents Preface.................................................................................................................................................. 3

Add to Reading List

Source URL: mttgroup.ch

Language: English - Date: 2014-11-18 04:09:23
43Aviation / Electronics / Aircraft Communications Addressing and Reporting System / ARINC / Iridium Communications / Controller Pilot Data Link Communications / Communications satellite / Aircraft instruments / Technology / Avionics

AFIRS™ 228 Automated Flight Information & Reporting System ACARS over Iridium and Cockpit SATCOM Voice Communications L-3’s AFIRS 228 Iridium Global Communications System provides aircraft crew with secure voice and

Add to Reading List

Source URL: www.l-3ar.com

Language: English - Date: 2014-08-21 11:16:05
44Videotelephony / Skype / Skype protocol / Network protocols / File sharing networks / NetBIOS / Peer-to-peer / Transmission Control Protocol / Secure Shell / Software / Computing / Voice over IP

Protocol Identification via Statistical Analysis (PISA) Black Hat 2007 Rohit Dhamankar and Rob King, TippingPoint Technologies Abstract A growing number of proprietary protocols are using end-to-end encryption to avoid

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
45Identity / Videotelephony / Authentication / Notary / Identity management / Password / Voice over IP / Smart card / Directory service / Security / Computer security / Access control

Unifying IP Communication Secure Profile Management Enterprise Security and Identity Management for IP-based Systems LiteScape Secure Profile Management™ unifies an organization’s identity management systems with IP

Add to Reading List

Source URL: www.litescape.com

Language: English - Date: 2010-06-29 20:11:55
46Computing / Cisco Systems / IP camera / Unified communications / Voice over IP / Videotelephony / Electronic engineering / Electronics

CTComp Spring 2015 Lunch & Learn Series Recover Anytime, Anywhere and from Any Disaster Expand and Secure your

Add to Reading List

Source URL: www.ctcomp.com

Language: English - Date: 2015-04-06 15:05:00
47Snom / Videotelephony / Secure communication / Wideband audio / Business telephone system / Transport Layer Security / Telephone number mapping / Comparison of VoIP software / Telephony / Voice over IP / Electronic engineering

• 4,3” TFT Touch screen with 24 bit color depth • Intuitive user interface • Gigabit Ethernet Switch • 2 x Typ A, USB – WLAN ready • Wideband Audio

Add to Reading List

Source URL: www.datatel.co.th

Language: English - Date: 2010-07-24 13:42:22
48Public-key cryptography / Electronic commerce / Key / Secure voice / Crypt / RSA / Cryptography / Secure communication / Key management

1 2 Contents Preface.................................................................................................................................................. 3

Add to Reading List

Source URL: www.mttgroup.ch

Language: English - Date: 2014-11-18 04:09:23
49Security / Android / Voice over IP / Secure voice / Secure telephone / Accellion /  Inc. / Secure communication / Computing / Technology

ASSURED MOBILE ENVIRONMENT SECURE MOBILITY ON COMMERCIAL DEVICES COMMUNICATE SECURELY ON THE GO

Add to Reading List

Source URL: www.motorolasolutions.com

Language: English - Date: 2015-03-19 15:35:12
50Information / ZRTP / Man-in-the-middle attack / Key-agreement protocol / Public key fingerprint / Secure Real-time Transport Protocol / Authentication / SAS / Secure voice / Cryptographic protocols / Cryptography / Security

Poster: Handsfree ZRTP - A Novel Key Agreement for RTP, Protected by Voice Commitments 1. Dominik Schürmann

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-05-31 08:50:04
UPDATE